SlideShare una empresa de Scribd logo
1 de 15
Resource Mining
Finding worthwhile resources for
successful research
12/17/2012 SSCRG @ UW Tacoma
Sources of Information
● Blogs
● Twitter
● Facebook
● Reddit/Slashdot/HackerNews
● IRC
● Mailing lists
● Google Groups
● Meetings/Conferences
SSCRG @ UW Tacoma12/17/2012
Skimming Information
Lots of articles aren't worth a complete read -
you can safely skip over / blink / or whatever
entire sections.
If you don't have time to finish it, leave it open
for later or use a "Read it Later" program.
Recording Resources
Use reference management software,
bookmarks, social media feeds, browser
history, etc.
Just make sure it's easy to find things later. You
will want/need them!
Reading Information
Focus on the basics in a field first. Don't worry
about knowing too much about them.
Example: What is DNS?
Answer: resolves hostname <-> ip,
forward/reverse lookups, zones, etc.
Don't worry about too much detail in the short
run.
Detecting False Information
Check the comments - if there are none, check
back later.
Check other posts by the poster.
Search for the title of the article on Google/Bing
and check aggregators.
Create a Identity
Create profiles with the same username, link
them together, and possibly add to resume.
Then create a website and add your elevator
pitch + links to all of these accounts.
Later on, add a blog and keep analytics of what
happens.
Make Connections
Once you have established a place on each one
of the "Sources of Information", follow those
who post information relevant to your field of
research.
"Following" Resources
● Use a RSS reader (Google Reader is great)
● Remain in IRC channels after your question
has been answered.
● Look for related posts to what you found
interesting.
● Bookmarks (including social bookmarks,
pinboard, etc)!
Finding Field Experts
Find the authors of the information you rely on.
● History of wiki pages
● Presenters at Defcon, BlackHat USA, AppSec,
CSA, etc.
IRC
● Most major open source software packages
have an IRC channel
● Find channels on Netsplit.de/SearchIRC
● Idle in the channel to see other people's
questions
Google Alerts: Setup keywords you want to
"watch", and configure a daily report of the
results
Google trends: find popular/relevant keywords
Google Tools
Solve other people's problems
Go to the "unanswered" section on the site.
http://stackoverflow.com/unanswered
Try to construct an answer, or at least think
about it for a while.
Example Problem
How would one keep track of changes on a
Linux server?
What about a Windows one?
What keywords would you use to find an
answer to this problem?
Q&A
SSCRG @ UW Tacoma8/17/2012

Más contenido relacionado

La actualidad más candente

TSEM Spring 2014 Storrs Class 2
TSEM Spring 2014 Storrs Class 2TSEM Spring 2014 Storrs Class 2
TSEM Spring 2014 Storrs Class 2Laksamee Putnam
 
TSEM Fall 2016 McArthur Class 1
TSEM Fall 2016 McArthur Class 1TSEM Fall 2016 McArthur Class 1
TSEM Fall 2016 McArthur Class 1Laksamee Putnam
 
Effective Internet Searching
Effective Internet SearchingEffective Internet Searching
Effective Internet SearchingMaggie Verster
 
Electronic Research: Sources and Strategies
Electronic Research: Sources and StrategiesElectronic Research: Sources and Strategies
Electronic Research: Sources and StrategiesAmy Ferguson
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsJohnBarsaga
 
Google for Research 2015
Google for Research 2015Google for Research 2015
Google for Research 2015Rosalind Hardin
 
Keyword Searching: Advanced Techniques
Keyword Searching: Advanced TechniquesKeyword Searching: Advanced Techniques
Keyword Searching: Advanced TechniquesKris Jacobson
 
Library research skills slideshare version-classroomedition
Library research skills slideshare version-classroomeditionLibrary research skills slideshare version-classroomedition
Library research skills slideshare version-classroomeditiondirtboy
 
3_crafting_original_content_2014october
3_crafting_original_content_2014october3_crafting_original_content_2014october
3_crafting_original_content_2014octoberRAO Jenkins
 
Search strategies – subject searching
Search strategies – subject searchingSearch strategies – subject searching
Search strategies – subject searchingdoverlibrary
 
Info Lit Day 2
Info Lit Day 2Info Lit Day 2
Info Lit Day 2amytaylor
 
Thomas Jefferson Blog Unit
Thomas Jefferson Blog UnitThomas Jefferson Blog Unit
Thomas Jefferson Blog Unittmgriset
 
Google scholar and the academic web
Google scholar and the academic webGoogle scholar and the academic web
Google scholar and the academic webJamie Bisset
 
Beyond wikipedia
Beyond wikipediaBeyond wikipedia
Beyond wikipediacnarshall81
 

La actualidad más candente (20)

TSEM Spring 2014 Storrs Class 2
TSEM Spring 2014 Storrs Class 2TSEM Spring 2014 Storrs Class 2
TSEM Spring 2014 Storrs Class 2
 
TSEM Fall 2016 McArthur Class 1
TSEM Fall 2016 McArthur Class 1TSEM Fall 2016 McArthur Class 1
TSEM Fall 2016 McArthur Class 1
 
Effective Internet Searching
Effective Internet SearchingEffective Internet Searching
Effective Internet Searching
 
Internet Research
Internet ResearchInternet Research
Internet Research
 
Electronic Research: Sources and Strategies
Electronic Research: Sources and StrategiesElectronic Research: Sources and Strategies
Electronic Research: Sources and Strategies
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 
Google
GoogleGoogle
Google
 
Google for Research 2015
Google for Research 2015Google for Research 2015
Google for Research 2015
 
Web based information resources
Web based information resourcesWeb based information resources
Web based information resources
 
Keyword Searching: Advanced Techniques
Keyword Searching: Advanced TechniquesKeyword Searching: Advanced Techniques
Keyword Searching: Advanced Techniques
 
Internet search techniques for K12
Internet search techniques for K12Internet search techniques for K12
Internet search techniques for K12
 
Library research skills slideshare version-classroomedition
Library research skills slideshare version-classroomeditionLibrary research skills slideshare version-classroomedition
Library research skills slideshare version-classroomedition
 
3_crafting_original_content_2014october
3_crafting_original_content_2014october3_crafting_original_content_2014october
3_crafting_original_content_2014october
 
Search strategies – subject searching
Search strategies – subject searchingSearch strategies – subject searching
Search strategies – subject searching
 
Info Lit Day 2
Info Lit Day 2Info Lit Day 2
Info Lit Day 2
 
Internet search techniques by zakir hossain
Internet search techniques by zakir hossainInternet search techniques by zakir hossain
Internet search techniques by zakir hossain
 
Search strategy
Search strategySearch strategy
Search strategy
 
Thomas Jefferson Blog Unit
Thomas Jefferson Blog UnitThomas Jefferson Blog Unit
Thomas Jefferson Blog Unit
 
Google scholar and the academic web
Google scholar and the academic webGoogle scholar and the academic web
Google scholar and the academic web
 
Beyond wikipedia
Beyond wikipediaBeyond wikipedia
Beyond wikipedia
 

Similar a Resource Mining for Effective Research

The Basics of Writing in the Digital Era Cherie Dargan CWW15
The Basics of Writing in the Digital Era Cherie Dargan CWW15The Basics of Writing in the Digital Era Cherie Dargan CWW15
The Basics of Writing in the Digital Era Cherie Dargan CWW15Cherie Dargan
 
"Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption" "Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption" J T "Tom" Johnson
 
Manage Your Data! Navigating Data Services at the UW Libraries
Manage Your Data! Navigating Data Services at the UW LibrariesManage Your Data! Navigating Data Services at the UW Libraries
Manage Your Data! Navigating Data Services at the UW LibrariesJennifer Muilenburg
 
The Big Six Research Skills
The Big Six Research SkillsThe Big Six Research Skills
The Big Six Research SkillsMrsMDXB
 
The Big Six
The Big SixThe Big Six
The Big SixMrsMDXB
 
Skillshare - Introduction to Data Scraping
Skillshare - Introduction to Data ScrapingSkillshare - Introduction to Data Scraping
Skillshare - Introduction to Data ScrapingSchool of Data
 
Search Engine Strategies
Search  Engine  StrategiesSearch  Engine  Strategies
Search Engine Strategiesjsotir
 
Step-by-Step to Successful Research
Step-by-Step to Successful ResearchStep-by-Step to Successful Research
Step-by-Step to Successful Researchsusanujkalarson
 
E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)
E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)
E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)madhavi2011
 
Workshop 2 - PowerPoint Presentation v03
Workshop 2  - PowerPoint Presentation v03Workshop 2  - PowerPoint Presentation v03
Workshop 2 - PowerPoint Presentation v03E-Mediat
 
Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...
Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...
Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...Stan Skrabut, Ed.D.
 
Workshop 2 - PowerPoint Presentation v10
Workshop 2 - PowerPoint Presentation v10Workshop 2 - PowerPoint Presentation v10
Workshop 2 - PowerPoint Presentation v10E-Mediat
 
Open source and then some: An Introduction
Open source and then some: An IntroductionOpen source and then some: An Introduction
Open source and then some: An IntroductionAkash Tandon
 
Microformats I: What & Why
Microformats I: What & WhyMicroformats I: What & Why
Microformats I: What & WhyRachael L Moore
 
Digifoot 2012 ppt
Digifoot 2012 pptDigifoot 2012 ppt
Digifoot 2012 ppttpoelzer
 

Similar a Resource Mining for Effective Research (20)

Web workshop
Web workshopWeb workshop
Web workshop
 
The Basics of Writing in the Digital Era Cherie Dargan CWW15
The Basics of Writing in the Digital Era Cherie Dargan CWW15The Basics of Writing in the Digital Era Cherie Dargan CWW15
The Basics of Writing in the Digital Era Cherie Dargan CWW15
 
Academic Research Social Networks 15 Strategy Tools
Academic Research Social Networks 15 Strategy ToolsAcademic Research Social Networks 15 Strategy Tools
Academic Research Social Networks 15 Strategy Tools
 
"Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption" "Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption"
 
Manage Your Data! Navigating Data Services at the UW Libraries
Manage Your Data! Navigating Data Services at the UW LibrariesManage Your Data! Navigating Data Services at the UW Libraries
Manage Your Data! Navigating Data Services at the UW Libraries
 
The Big Six Research Skills
The Big Six Research SkillsThe Big Six Research Skills
The Big Six Research Skills
 
The Big Six
The Big SixThe Big Six
The Big Six
 
Library 2.0: A Roadmap
Library 2.0: A RoadmapLibrary 2.0: A Roadmap
Library 2.0: A Roadmap
 
Skillshare - Introduction to Data Scraping
Skillshare - Introduction to Data ScrapingSkillshare - Introduction to Data Scraping
Skillshare - Introduction to Data Scraping
 
Search Engine Strategies
Search  Engine  StrategiesSearch  Engine  Strategies
Search Engine Strategies
 
Step-by-Step to Successful Research
Step-by-Step to Successful ResearchStep-by-Step to Successful Research
Step-by-Step to Successful Research
 
Ias2010
Ias2010Ias2010
Ias2010
 
E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)
E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)
E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)
 
Workshop 2 - PowerPoint Presentation v03
Workshop 2  - PowerPoint Presentation v03Workshop 2  - PowerPoint Presentation v03
Workshop 2 - PowerPoint Presentation v03
 
Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...
Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...
Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...
 
Workshop 2 - PowerPoint Presentation v10
Workshop 2 - PowerPoint Presentation v10Workshop 2 - PowerPoint Presentation v10
Workshop 2 - PowerPoint Presentation v10
 
Open source and then some: An Introduction
Open source and then some: An IntroductionOpen source and then some: An Introduction
Open source and then some: An Introduction
 
Microformats I: What & Why
Microformats I: What & WhyMicroformats I: What & Why
Microformats I: What & Why
 
2.0 Watch
2.0 Watch2.0 Watch
2.0 Watch
 
Digifoot 2012 ppt
Digifoot 2012 pptDigifoot 2012 ppt
Digifoot 2012 ppt
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Resource Mining for Effective Research

  • 1. Resource Mining Finding worthwhile resources for successful research 12/17/2012 SSCRG @ UW Tacoma
  • 2. Sources of Information ● Blogs ● Twitter ● Facebook ● Reddit/Slashdot/HackerNews ● IRC ● Mailing lists ● Google Groups ● Meetings/Conferences SSCRG @ UW Tacoma12/17/2012
  • 3. Skimming Information Lots of articles aren't worth a complete read - you can safely skip over / blink / or whatever entire sections. If you don't have time to finish it, leave it open for later or use a "Read it Later" program.
  • 4. Recording Resources Use reference management software, bookmarks, social media feeds, browser history, etc. Just make sure it's easy to find things later. You will want/need them!
  • 5. Reading Information Focus on the basics in a field first. Don't worry about knowing too much about them. Example: What is DNS? Answer: resolves hostname <-> ip, forward/reverse lookups, zones, etc. Don't worry about too much detail in the short run.
  • 6. Detecting False Information Check the comments - if there are none, check back later. Check other posts by the poster. Search for the title of the article on Google/Bing and check aggregators.
  • 7. Create a Identity Create profiles with the same username, link them together, and possibly add to resume. Then create a website and add your elevator pitch + links to all of these accounts. Later on, add a blog and keep analytics of what happens.
  • 8. Make Connections Once you have established a place on each one of the "Sources of Information", follow those who post information relevant to your field of research.
  • 9. "Following" Resources ● Use a RSS reader (Google Reader is great) ● Remain in IRC channels after your question has been answered. ● Look for related posts to what you found interesting. ● Bookmarks (including social bookmarks, pinboard, etc)!
  • 10. Finding Field Experts Find the authors of the information you rely on. ● History of wiki pages ● Presenters at Defcon, BlackHat USA, AppSec, CSA, etc.
  • 11. IRC ● Most major open source software packages have an IRC channel ● Find channels on Netsplit.de/SearchIRC ● Idle in the channel to see other people's questions
  • 12. Google Alerts: Setup keywords you want to "watch", and configure a daily report of the results Google trends: find popular/relevant keywords Google Tools
  • 13. Solve other people's problems Go to the "unanswered" section on the site. http://stackoverflow.com/unanswered Try to construct an answer, or at least think about it for a while.
  • 14. Example Problem How would one keep track of changes on a Linux server? What about a Windows one? What keywords would you use to find an answer to this problem?
  • 15. Q&A SSCRG @ UW Tacoma8/17/2012